Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add PathBuf::leak & OsString::leak #389

Closed
its-the-shrimp opened this issue Jun 3, 2024 · 5 comments
Closed

Add PathBuf::leak & OsString::leak #389

its-the-shrimp opened this issue Jun 3, 2024 · 5 comments
Labels
ACP-accepted API Change Proposal is accepted (seconded with no objections) api-change-proposal A proposal to add or alter unstable APIs in the standard libraries T-libs-api

Comments

@its-the-shrimp
Copy link

its-the-shrimp commented Jun 3, 2024

Proposal

Add a leak method to std::path::PathBuf & std::ffi::OsString

Problem statement

String, Vec, OsString, PathBuf, all 4 are common container types in the standard library, however, only 2 of them implement a way to leak their allocated memory: String & Vec, OsString & PathBuf are missing this functionality for no good reason.

Motivating examples or use cases

Aside from simple consistency in the APIs, a use case for leaking OsStrings & PathBufs which prompted me to write this proposal is using arguments provided through the CLI to perform a certain task that requires the strings to be shared, potentially across multiple threads.

Solution sketch

impl OsString {
    fn leak<'a>(self) -> &'a mut OsStr { ... }
}

impl PathBuf {
    fn leak<'a>(self) -> &'a mut Path { ... }
}

Alternatives

The alternative is to do nothing, and force the users to leak OsStrings & PathBufs via

Box::leak(path_buf.into_boxed_path())

or

Box::leak(os_string.into_boxed_os_str())

Which doesn't seem to be justified by anything

Links and related work

https://doc.rust-lang.org/nightly/std/string/struct.String.html#method.leak
https://doc.rust-lang.org/nightly/std/vec/struct.Vec.html#method.leak
https://doc.rust-lang.org/nightly/std/boxed/struct.Box.html#method.leak

What happens now?

This issue contains an API change proposal (or ACP) and is part of the libs-api team feature lifecycle. Once this issue is filed, the libs-api team will review open proposals as capability becomes available. Current response times do not have a clear estimate, but may be up to several months.

Possible responses

The libs team may respond in various different ways. First, the team will consider the problem (this doesn't require any concrete solution or alternatives to have been proposed):

  • We think this problem seems worth solving, and the standard library might be the right place to solve it.
  • We think that this probably doesn't belong in the standard library.

Second, if there's a concrete solution:

  • We think this specific solution looks roughly right, approved, you or someone else should implement this. (Further review will still happen on the subsequent implementation PR.)
  • We're not sure this is the right solution, and the alternatives or other materials don't give us enough information to be sure about that. Here are some questions we have that aren't answered, or rough ideas about alternatives we'd want to see discussed.
@its-the-shrimp its-the-shrimp added api-change-proposal A proposal to add or alter unstable APIs in the standard libraries T-libs-api labels Jun 3, 2024
@its-the-shrimp
Copy link
Author

I already have a half-finished impl of this that I'll submit if this is accepted

@ChrisDenton
Copy link
Member

ChrisDenton commented Jun 3, 2024

Box::leak(os_string.into_boxed_os_str())

I believe this can also now be done via:

unsafe { OsStr::from_encoded_bytes_unchecked(os_string.into_encoded_bytes().leak()) }

But removing the need for unsafe would, I think, be a justification for just having a direct leak method.

@its-the-shrimp
Copy link
Author

Yes, another, albeit trivial, point is that leaking a Box, while being safe, discards the extra unused space, which might incur a reallocation

@pitaj
Copy link

pitaj commented Jun 3, 2024

Yes, another, albeit trivial, point is that leaking a Box, while being safe, discards the extra unused space, which might incur a reallocation

Only applies to OsString since you could do Path::new(pb.into_os_string().leak()) once you have OsString::leak.

@dtolnay
Copy link
Member

dtolnay commented Jun 4, 2024

Thanks for the ACP. Makes sense to me -- I am ready to accept a PR adding the 2 proposed methods as unstable.

@dtolnay dtolnay closed this as completed Jun 4, 2024
@dtolnay dtolnay added the ACP-accepted API Change Proposal is accepted (seconded with no objections) label Jun 4, 2024
matthiaskrgr added a commit to matthiaskrgr/rust that referenced this issue Jun 5, 2024
…ak, r=workingjubilee

Implement `os_string_pathbuf_leak`

implementation of rust-lang#125965

ACP: rust-lang/libs-team#389 [ Accepted ]
bors added a commit to rust-lang-ci/rust that referenced this issue Jun 8, 2024
…, r=workingjubilee

Implement `os_string_pathbuf_leak`

implementation of rust-lang#125965

ACP: rust-lang/libs-team#389 [ Accepted ]
RalfJung pushed a commit to RalfJung/miri that referenced this issue Jun 8, 2024
…ngjubilee

Implement `os_string_pathbuf_leak`

implementation of #125965

ACP: rust-lang/libs-team#389 [ Accepted ]
flip1995 pushed a commit to flip1995/rust-clippy that referenced this issue Jun 28, 2024
…ngjubilee

Implement `os_string_pathbuf_leak`

implementation of #125965

ACP: rust-lang/libs-team#389 [ Accepted ]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ACP-accepted API Change Proposal is accepted (seconded with no objections) api-change-proposal A proposal to add or alter unstable APIs in the standard libraries T-libs-api
Projects
None yet
Development

No branches or pull requests

4 participants